RCR 092: Endpoint Detection and Response – CISSP Training and Study!
Apr 20, 2020Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS
Description:
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.
Shon will provide CISSP study and training for Domain 4 (Communication and Network Security) of the CISSP Exam. His knowledge will provide the skills needed to pass the CISSP.
BTW - Get access to all my Free Content and CISSP Training Courses here at: https://shongerber.com/
Available Courses:
- CISSP Training Course - https://www.shongerber.com/offers/zYsL6MCB
- CISO Training Course - https://www.shongerber.com/offers/zd2RbL6o
CISSP Exam Questions
Question: 159
Vulnerabilities and risks are evaluated based on their threats against which of the following?
- A) One or more of the CIA Triad principles
- B) Data usefulness
- C) Due care
- D) Extent of liability
One or more of the CIA Triad principles
Vulnerabilities and risks are evaluated based on their threats against one or more of the CIA Triad principles.
https://www.brainscape.com/subjects/cissp-domains
------------------------------------
Question: 160
While performing a risk analysis, you identify a threat of fire and a vulnerability because there are no fire extinguishers. Based on this information, which of the following is a possible risk?
- A) Virus infection
- B) Damage to equipment
- C) System malfunction
- D) Unauthorized access to confidential information
Damage to equipment
The threat of a fire and the vulnerability of a lack of fire extinguishers lead to the risk of damage to equipment.
https://www.brainscape.com/subjects/cissp-domains
------------------------------------
Question: 161
What process or event is typically hosted by an organization and is targeted to groups of employees with similar job functions?
- A) Education
- B) Awareness
- C) Training
- D) Termination
Training
Training is teaching employees to perform their work tasks and to comply with the security policy. Training is typically hosted by an organization and is targeted to groups of employees with similar job functions.
https://www.brainscape.com/subjects/cissp-domains
Want to find Shon elsewhere on the internet?
LinkedIn – www.linkedin.com/in/shongerber
Facebook - https://www.facebook.com/CyberRiskReduced/
LINKS:
- ISC2 Training Study Guide
- Online Article
Stay connected with news and updates!
Join our mailing list to receive the latest news and updates from our team.
Don't worry, your information will not be shared.
We hate SPAM. We will never sell your information, for any reason.